[ 
https://issues.apache.org/jira/browse/KARAF-3621?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14369286#comment-14369286
 ] 

Ancoron Luciferis commented on KARAF-3621:
------------------------------------------

Of course, preferable would be something like an Ed25519, but this is currently 
not supported by MINA/SSHD, so we're left with RSA.

> Generate a more secure host key for SSH by default
> --------------------------------------------------
>
>                 Key: KARAF-3621
>                 URL: https://issues.apache.org/jira/browse/KARAF-3621
>             Project: Karaf
>          Issue Type: Improvement
>          Components: karaf-shell
>    Affects Versions: 3.0.3
>            Reporter: Ancoron Luciferis
>              Labels: security
>
> By default, the Karaf SSH server generates a new 1024-bit DSA host key.
> As we've learned from the crypto specialists in the past few years, this is 
> no longer seen as being a reasonably secure key pair generation algorithm.
> At the time of this writing, a reasonably secure key pair would be generated 
> using RSA with a size of 4096 bits.
> References:
> * 
> http://security.stackexchange.com/questions/5096/rsa-vs-dsa-for-ssh-authentication-keys
> * http://meyering.net/nuke-your-DSA-keys/
> * https://stribika.github.io/2015/01/04/secure-secure-shell.html



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to